You are on page 1of 63

DFS40093 ETHICAL

HACKING
CHAPTER 2
GATHERING TARGET INFORMATION
Learning Outcome

• Trace footprinting technique using tools


• Reconnaissance and footprinting
• Information gathering
• Footprinting Tools
• Information gathering methodology
• Google hack
• Explain social engineering
• Human based
• Computer based
• Coutermeasure
Exercise
• Perform a footprinting to determine operating system and other information
related on PUO website.
• Task:
• This is individual exercise
• Paste your finding in ‘Borak Cyber Security’ forum in Cidos
• Please be in mind this is for educational purpose only. Play out of the scope at your own
risk.
Exercise
• Perform a google hacking using ‘filetype’ search operator to find Microsoft
Access database(.??) file in PUO domain (.puo.edu.my).
• Task:
• This is individual exercise
• Paste your finding in ‘Borak Cyber Security’ forum in Cidos
• Please be in mind this is for educational purpose only. Play out of the scope at your own
risk.
Google Hacking [Vidoe]

https://www.youtube.com/watch?v=Ft5gND96EBk
Exercise

Search PUO old version website using archieve.org


Vishing [Youtube]

https://www.youtube.com/watch?v=BEHl2lAuWCk
Activity
• Video a role play about Social Engineering. You can choose either Human
based or computer based social engineering.
• Group activity: 3 to 4 students
• Video duration: 5 – 15 minutes
• Paste your finding in ‘Borak Cyber Security’ forum in Cidos

You might also like